Today’s attackers are more advanced than at any time in modern history.
With the growth of world-wide hacking groups and state-sponsored attacks, no industry sector is immune from attack.
What is Vulnerability Assessment?
- A vulnerability assessment is a regular process of identifying, quantifying, and prioritizing the vulnerabilities in a system, an application or a network component, often as a means of demonstrating security compliance. For example, quarterly vulnerability assessments are a requirement for obtaining and maintaining PCI DSS Compliance certification by companies accepting credit and debit payments.
What happens during the assessment?
- During a vulnerability assessment, we’ll catalog assets and capabilities in a system, assign a value and level of importance to those resources, identify the vulnerabilities or potential threats and then recommend controls to mitigate or eliminate the most serious vulnerabilities for the most valuable resources. A vulnerability assessment can also be done in preparation for a penetration test, to identify the weaknesses to be exploited in the test.